咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 信息与通信工程
  • 2 篇 理学
    • 2 篇 数学

主题

  • 5 篇 universally comp...
  • 1 篇 group key exchan...
  • 1 篇 bounded retrieva...
  • 1 篇 learning with er...
  • 1 篇 protocol
  • 1 篇 concurrent denia...
  • 1 篇 key exchange
  • 1 篇 secure positioni...
  • 1 篇 the decisional c...
  • 1 篇 universally comp...
  • 1 篇 attack
  • 1 篇 oblivious transf...
  • 1 篇 information secu...
  • 1 篇 security
  • 1 篇 burmester-desmed...
  • 1 篇 verifiably smoot...
  • 1 篇 post-quantum
  • 1 篇 ideal functional...
  • 1 篇 position-based c...
  • 1 篇 mapping algorith...

机构

  • 1 篇 mobile network s...
  • 1 篇 institute of sci...
  • 1 篇 state key labora...
  • 1 篇 technische unive...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 school of cyber ...
  • 1 篇 key laboratory o...

作者

  • 3 篇 ma jianfeng
  • 1 篇 yu-pu hu
  • 1 篇 le fulong
  • 1 篇 sangjae moon
  • 1 篇 廖乐健
  • 1 篇 deng miaolei
  • 1 篇 yang chao
  • 1 篇 zhang junwei
  • 1 篇 mo-meng liu
  • 1 篇 feng tao
  • 1 篇 li fenghua
  • 1 篇 yang li
  • 1 篇 johannes buchman...
  • 1 篇 juliane kramer
  • 1 篇 张子剑
  • 1 篇 祝烈煌

语言

  • 3 篇 英文
  • 2 篇 中文
检索条件"主题词=universally composable"
5 条 记 录,以下是1-10 订阅
排序:
universally composable secure positioning in the bounded retrieval model
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 75-89页
作者: ZHANG JunWei MA JianFeng YANG Chao YANG Li School of Cyber Engineering Xidian University
The universal composition security of secure positioning, which is a vital primitive in position-based cryptography, is investigated in this paper. This paper proposes a universally composable secure positioning model... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
universally composable Three Party Password-based Key Exchange Protocol
收藏 引用
China Communications 2009年 第3期6卷 150-155页
作者: Deng Miaolei Ma Jianfeng Le Fulong School of Computer Xidian University Xi'an 710071 China Institute of Science Information Engineering University Zhengzhou 450001 China
Within the framework of universal composability,an appropriate ideal functionality that captures the basic security requirements of three party password-based key exchange was defined. An efficient real-word three par... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
universally composable Symbolic Analysis of Group Key Exchange Protocol
收藏 引用
China Communications 2011年 第2期8卷 59-65页
作者: 张子剑 祝烈煌 廖乐健 School of Computer Science and Technology Beijing Institute of Technology
Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A new approach for UC security concurrent deniable authentication
收藏 引用
Science in China(Series F) 2008年 第4期51卷 352-367页
作者: FENG Tao LI FengHua MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Computer and Communications Lanzhou University of Technology Lanzhou 730050 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dong Buk-ku Daeyu 702-701 Korea
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum security analysis of a lattice-based oblivious transfer protocol
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2017年 第9期18卷 1348-1369页
作者: Mo-meng LIU Juliane KRAMER Yu-pu HU Johannes BUCHMANN State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China Technische Universitiat Darrastadt Darmstadt 64289 Germany
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely used as building blocks in secure multiparty computation and high-level protocols. The security of OT protocols built ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论